[1]
M. . Elgarhy, H. . Hamdani, L. P. . Sapkota, and A. M. . Gemeay, “A Novel of Bounded Zeghdoudi Distribution: Estimations, Simulation and Applications”, Mesopotamian Journal of CyberSecurity, vol. 5, no. 3, pp. 1292–1323, Dec. 2025, doi: 10.58496/MJCS/2025/067.